Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      Need4Weed

      Worldwide IP Range Lookup and Range Finders etc

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      This is a IP Tool kit its the central backbone of IPs on the whole internet ! You can Find any sort of company to IP to IP ranges that run certain OS for hackign and scanning i use for !

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By Big Data

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to exploiting each vulnerability.
          This course not just focuses on attacks but also helps understanding the mitigations for each vulnerability.
          Students will understand the mitigations through Secure Source Codes and Best Practices provided in this course that should be followed by the developers to protect their web application from these vulnerabilities.
          What you’ll learn

          Web Application Pentesting
          Completing 20 exercise of Mutillidae Vulnerable Web Application
          OWASP top 10 2017
          Mitigations for each vulnerability
          Secure code for mitigation
          Are there any course requirements or prerequisites?
          This course is for beginners
          Basic knowledge of OWASP top 10
          Basics of using Burp Suite and Proxy
          Burpsuite and Browser Setup

          Who this course is for:

          Beginner ethical hacking students
          Students who want to learn Web Application Pentesting
          Students who want to perform exercises on Mutillidae Vulnerable Application
          Students who want to learn about the Mitigations of each vulnerability in OWASP top 10 2017
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Big Data

          Hidden Content
          Give reaction to this post to see the hidden content. WiFi Hacking using Evil Twin Attacks and Captive Portals
          Description
          In this course I will show you how to create the most common and effective evil twin attacks using captive portals.
          You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials.
          All the attacks in this course are highly practical and straight to the point.
          By the time you've completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.
          What you’ll learn
              Set Up an Access Point with a Captive Portal.
              Create a Fake Captive Portal and use it to Steal Login Information.
              Customizing the Captive Portal Page.
              How to Sniff and Inject Packets into a Wireless Network.
              Use Wireshark Filters to Inspect Packets.
              Perform an Evil Twin Attack with Airgeddon.
              Stealing Social Media Accounts using a Captive Portal.
              How to use Dns Spoofing and BeEF using WiFi Pumpkin.
              Stealing Login Credentials from a WPA Enterprise Network.
              Detect and Secure Your System from Evil Twin Attacks.
          Are there any course requirements or prerequisites?
              Computer with at least one wireless card to act as an access point.
              Desire to learn.
          Who this course is for:
              For everyone who wants to learn Wi-Fi Hacking using Evil Twin Attacks.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. COOK
          A customizable wordlist and password generator
          Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function to create complex endpoints, wordlists and passwords. Easy UX, Checkout Usage

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator.
          This tool helps you to automate the obfuscation process of any script written in PowerShell with different techniques. You can use any of them separately, together or all of them sequentially with ease, from Windows or Linux.

          Hidden Content
          Give reaction to this post to see the hidden content.